Short Name |
HTTP:STC:MOZILLA:JSCRIPT-CLIP |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
HTTP |
Keywords |
Mozilla JavaScript Clipboard Access |
Release Date |
2004/09/15 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Mozilla client's clipboard. All Mozilla 1.7.2 and NetScape Navigator 7.2 and prior versions are vulnerable. Attackers can download malicious JavaScript code to manipulate the clipboard contents and cause a denial-of-service condition or execute arbitrary code.
Mozilla is reportedly affected by multiple heap based buffer overflow vulnerabilities when processing URIs in emails. These issues are due to a failure of the affected application to validate user-supplied string lengths before copying them into finite process buffers. An attacker might leverage these issues to have arbitrary code executed in the context of the user running the vulnerable application.